Keystroke Logging - Espionage Unlimited
spy articles, surveillance articles, spy, free, news, espionage, gear, equipment, information, advice, how to, tools, products

 Spy Gear -   Surveillance Equipment -   Spy Tools -   Spy Articles -   Spy News -   Surveillance Articles
Spy Information -   Advice & How To -   Spy Products -   New Identity -   Fake ID -   and much more!

Espionage Unlimited Home.. Spy Gear & Surveillance Equipment.. Spy Cams & Security Cameras.. New Identity Fake ID Spy Weapons Private Investigation PI Training Course.. Spy Links..

Spy Articles Index

Keystroke Logging



I Lost My Baby, My Pickup, and My Guitar on the Information Highway

There are a variety of ways to track keystrokes and log instant messaging sessions, but let me offer a word of caution before we go there. If your friend believes that her husband's affections may be wandering, the best tool to address the problem really isn't a computer. Spying on someone you love, with or without the aid of technology, is ugly. Consider that you may learn things that are very painful, or that you may anger the other party when the subterfuge is revealed. A good old-fashioned OFFLINE chat or a counseling session (with or without the spouse) may be the most direct, and most effective way to get to the bottom of it all.

That said, most instant messaging programs either have session logging built in, or you can install a third-party plugin to enable logging. A quick web search will show you where to find those plugins. Also, the Google Toolbar will archive and allow you to search email from Gmail, Outlook, Outlook Express, Netscape Mail and Thunderbird; Web pages you have visited; files on your computer, including text, Word, Excel, Powerpoint, image, audio, and video files; and yes... chats from AOL, AOL Instant Messenger, and MSN Messenger.

There are also general purpose loggers that can track every keystroke that is sent or received. I won't provide any links to those, because I've never used them, recommend against them for ethical reasons, and wouldn't trust them on my computer. The problem with all of these logging utilities is that they are detectable, either in the Windows system tray, Task Manager or by anti-virus and anti-spyware software.

So what happens if the suspected infidel finds out that he or she is being spied upon? Chances are it will either shatter whatever trust remains in the relationship, or they'll just find another venue to communicate. The chances of ending up in a win-win situation are very slim.

NEWS FLASH! After publishing this article, the following info from the Internet Patrol came to my attention. A Florida court has ruled that it is not ok to install spyware on your spouses computer to monitor what they do, and that, indeed, to do so rises to the level of a punishable criminal offense. For the full story, see Spouse Spanked for Spying.

Is There Such a Thing as a Semi Sequitur?

By the way, "I Lost My Baby, My Pickup, and My Guitar on the Information Highway" is the title of a humorous book written back in 1995 by Judy Heim. You can still find it on Amazon.com. I credit Judy with getting me started on the path to writing several books of my own, since she recommend me to No Starch Press after reading my "Accessing the Internet by Email" guide.

Reprinted from: http://www.askbobrankin.com/keystroke_logging.html

BOB RANKIN... is a tech writer and computer programmer who enjoys exploring the Internet and sharing the fruit of his experience with others. His work has appeared in ComputerWorld, NetGuide, and NY Newsday. Bob is publisher of the Internet TOURBUS newsletter, author of several computer books, and creator of the http://LowfatLinux.com website. Visit Bob Rankin's website for more helpful articles and free tech support.

Article Source: http://EzineArticles.com/?expert=Bob_Rankin

Other Recent EzineArticles from the Internet-and-Businesses-Online:Security Category:

Most Viewed EzineArticles in the Internet-and-Businesses-Online:Security Category

  1. How To Remove Winfixer 2005 Plus Unwanted Spyware And Adware
  2. Bypass your School and Work Filters with an Anonymous Proxy Server
  3. Top Ten Spyware and Adware Threats Identified
  4. Detect Spyware Online
  5. Does IP Address Reveal My Physical Location?
  6. Can I Guess Your Password?
  7. How to Manage Your Username and Password The Easy and Secure Way
  8. Spyware - Now a Problem for Mac Users as Well
  9. Spy Scanners Dont Compromise your Privacy
  10. Protect Your Little Black Book
  11. How To Clean the Spies In Your Computer?
  12. Virtual Credit Cards For Safer Online Shopping
  13. Web and Computer Security
  14. Dialing Up a Scam: Avoiding the Auto-Dialer Virus
  15. Hacking the Body Via PDA Wireless Device

Spyware X-terminator - Anti-Spyware Program StealthSurf X-treme - Complete Internet Privacy Privacy Protector X-treme - Total Computer Privacy


Related Links:


Looking for Telephone Bugs

Protect Yourself with a Spy Phone

Listening in With Cell Phone Bugs

Spyware Remover Protect Your Computer from Spyware

How To Buy A Spy Camera In 3 Easy Steps

spy articles, surveillance articles, spy, free, news, espionage, gear, equipment, information, advice, how to, tools, products

Spy Articles Index..

Espionage Unlimited Home.. Spy Gear & Surveillance Equipment.. Spy Cams & Security Cameras.. New Identity Fake ID Spy Weapons Private Investigation PI Training Course.. Spy Links..

Google Yahoo Ask Jeeves MSN DMOZ

spy articles, surveillance articles, spy, free, news, espionage, gear, equipment, information, advice, how to, tools, products Copyright 2005-2007 Espionage Unlimited - A Keystroke Logging Article.